When a thin client using BIP157/BIP158 (Neutrino) requests the block filter for the latest block, would it be possible for the full node serving this request to attack the Neutrino node by providing a ...

In Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Joachim Breitner and Nadia Heninger use a lattice based algorithm to recover private keys from signatures in ...

I opened bitcoin-qt after not mining for a couple months and found that I suddenly have no more bitcoins! And I see that there were 2 transactions that I did not authorize sending my coins to other ...

As I understand finding the correct Nonce is the basis when hashing transactions for Proof of Work.
How and where is this decided in the ecosystem what the next Nonce is?
In my limited understanding ...

I have some bitcoins and ether at Blockchain.info and I am really scared of losing them.
How do I best secure them? Right now I have a paper with the code to restore my wallet, but my coins are still ...

I have been doing some research on the Bitcoin Cash hard fork and the main contention of increasing the block size appears to be the possibility of less security on the network. How does an increased ...

I have found a different receiving address within my wallet that is not mine... at least I did not create it. It seems to me that all of my transactions are now going to this new address instead of ...

I have been trying to find a "bitcoin mixing" service but it seems that ALL the "bitcoin mixing" sites I have looked at are scam. Does anybody know of any that are actually real and do what they say ...

According to this article: (https://medium.com/@avivzohar/the-spectre-protocol-7dbbebb707b5) written by one of Spectre's author (Aviv Zohar), it is mentioned that Spectre has weak liveness.
What is ...

I set up a bitcoind server on an Ubuntu server and I can remotely execute commands on the server. I am doing this with Java/RPC. To execute a command I need to provide a username and password. But I ...

I often read that checkpoints protect the network from a 51% attack because an attacker cannot reverse transactions made before the last checkpoint.
How exactly does this checkpoint mechanism work? ...

At risk of creating a "lets discuss politics" question, let me clarify that what I want to know is whether there is a known benefit to Satoshi's "duplicate the last hash" merkle tree implementation ...

According to this answer: https://bitcoin.stackexchange.com/a/58908/41513 a Byzantine Fault Tolerant (BFT) consensus threshold is 1/3, that is contrary to belief that the Bitcoin network is secure (...

I am new to Bitcoin. I used Electrum software to create my first wallet. When the software generated 12 words, I had written down that in paper. These word are very important, right? But the software ...

I say this because of the following reasoning: Lightning network wallets will have to completely possess my private key, whereas non-LN hot wallets will most of the time only have my key encrypted (I ...

I have a question about the security of digital currencies, however still I have find a clear answer for that. No matter what is the currency, e.g bitcoin, monero, ..., at the end of the day, I have ...

I'm new to bitcoin, downloaded the bitcoin.org client, encrypted my wallet, and purchase a few bitcoins (5.25), for learning purposes. But now my coins seem to have disappeared to an unknown address.
...

I know about the privacy and security implications of address reuse. But I was thinking about a scenario where I have one address for every person I receive transactions from. This would still have ...

If I use bitcoin core binary release I can verify them with the gpg keys of the core developers. Is there a similar process for the source code? A follow-up question: Is it preferable to use signed ...

I am trying to understand all security regarding blockchain and bitcoins.
Let's say you have a bitcoin wallet which is secured, only you know the private key. This bitcoin address was created on one ...

In the BIP by Pieter Wuille it is told that the key prefixed version of Schnorr signature is needed when the scheme is used in combination with BIP32's unhardened derivation. Could someone provide an ...